E-crime investigation courses launched

A new company is offering training courses for IT professionals in how to investigate computer crime.

A new company is offering training courses for IT professionals in how to investigate computer crime.

Evidex, which was formed last month, offers courses for a range of staff, including those responsible for IT security, fraud and intellectual property, in the public and private sectors. Staff responsible for dealing with unfair dismissal policies and protecting an organisation's intellectual property will also be targeted.

Training will focus on how to extract, preserve or process electronic evidence, combined with information on legislation and regulation. Staff will also be trained in how to safely enter a computer system, network or data storage device and recover data while preserving the chain of evidence.

"More than 93% of business communication is created electronically, said Louise Potter, managing director of Evidex. "It is therefore not surprising that more and more evidence is in digital form. However, until now, courses on e-crime were run by, and aimed at, law enforcement agencies. There has been little opportunity for other organisations and businesses to learn about computer forensics.

"Our training courses are geared towards helping organisations realise that there is more to e-crime than the retrieval of evidence - it is also about the legalities behind it, such as who can do it, under what circumstances and how organisations can protect both their staff and themselves."
This was last published in February 2004

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...